{"id":"https://openalex.org/W2974020258","doi":"https://doi.org/10.1109/ic3.2019.8844944","title":"Hybrid Approach for detecting DDOS Attacks in Software Defined Networks","display_name":"Hybrid Approach for detecting DDOS Attacks in Software Defined Networks","publication_year":2019,"publication_date":"2019-08-01","ids":{"openalex":"https://openalex.org/W2974020258","doi":"https://doi.org/10.1109/ic3.2019.8844944","mag":"2974020258"},"language":"en","primary_location":{"id":"doi:10.1109/ic3.2019.8844944","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3.2019.8844944","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 Twelfth International Conference on Contemporary Computing (IC3)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056172349","display_name":"Gaganjot Kaur","orcid":"https://orcid.org/0000-0001-9326-9196"},"institutions":[{"id":"https://openalex.org/I55016150","display_name":"Manav Rachna International Institute of Research and Studies","ror":"https://ror.org/02kf4r633","country_code":"IN","type":"education","lineage":["https://openalex.org/I4405253735","https://openalex.org/I55016150"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Gaganjot Kaur","raw_affiliation_strings":["Department of Computer Science & Technology, Manav Rachna University, Faridabad"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science & Technology, Manav Rachna University, Faridabad","institution_ids":["https://openalex.org/I55016150"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100716720","display_name":"P. Gupta","orcid":"https://orcid.org/0000-0002-8575-6047"},"institutions":[{"id":"https://openalex.org/I55016150","display_name":"Manav Rachna International Institute of Research and Studies","ror":"https://ror.org/02kf4r633","country_code":"IN","type":"education","lineage":["https://openalex.org/I4405253735","https://openalex.org/I55016150"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Prinima Gupta","raw_affiliation_strings":["Department of Computer Science & Technology, Manav Rachna University, Faridabad"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science & Technology, Manav Rachna University, Faridabad","institution_ids":["https://openalex.org/I55016150"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5056172349"],"corresponding_institution_ids":["https://openalex.org/I55016150"],"apc_list":null,"apc_paid":null,"fwci":1.6713,"has_fulltext":false,"cited_by_count":23,"citation_normalized_percentile":{"value":0.85895792,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"2019","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8318274021148682},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8197593688964844},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.6519231200218201},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6067717671394348},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5153431296348572},{"id":"https://openalex.org/keywords/controller","display_name":"Controller (irrigation)","score":0.5095927715301514},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.48434507846832275},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.474489688873291},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.39289402961730957},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3799852728843689},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3593698740005493},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.35087087750434875},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.34574830532073975},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1740616261959076},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.15579485893249512}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8318274021148682},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8197593688964844},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.6519231200218201},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6067717671394348},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5153431296348572},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.5095927715301514},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.48434507846832275},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.474489688873291},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.39289402961730957},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3799852728843689},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3593698740005493},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.35087087750434875},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.34574830532073975},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1740616261959076},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15579485893249512},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/ic3.2019.8844944","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3.2019.8844944","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 Twelfth International Conference on Contemporary Computing (IC3)","raw_type":"proceedings-article"},{"id":"mag:3092064710","is_oa":false,"landing_page_url":"https://jglobal.jst.go.jp/en/detail?JGLOBAL_ID=201902214434285023","pdf_url":null,"source":{"id":"https://openalex.org/S4306512817","display_name":"IEEE Conference Proceedings","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":"IEEE Conference Proceedings","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5199999809265137,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1573161722","https://openalex.org/W1596374547","https://openalex.org/W1930856805","https://openalex.org/W1986495842","https://openalex.org/W1993072051","https://openalex.org/W2040978774","https://openalex.org/W2084915558","https://openalex.org/W2085361835","https://openalex.org/W2519646782","https://openalex.org/W2546812236","https://openalex.org/W2548037070","https://openalex.org/W2584217814","https://openalex.org/W2605873363","https://openalex.org/W2735897973","https://openalex.org/W2768853466","https://openalex.org/W2804647886","https://openalex.org/W2808604192","https://openalex.org/W2944452041"],"related_works":["https://openalex.org/W2767068794","https://openalex.org/W2735897973","https://openalex.org/W2039821316","https://openalex.org/W4229489764","https://openalex.org/W3114854705","https://openalex.org/W3036366741","https://openalex.org/W3195575042","https://openalex.org/W2388081684","https://openalex.org/W1543555101","https://openalex.org/W2898113880"],"abstract_inverted_index":{"In":[0],"today's":[1],"time":[2,144],"Software":[3],"Defined":[4],"Network":[5],"(SDN)":[6],"gives":[7],"the":[8,13,17,60,64,87,94,101,109,115,122,126,134,167,179,205,223,236,238],"complete":[9],"control":[10],"to":[11,25,44,52,107,161],"get":[12],"data":[14,27,207],"flow":[15,89,96,136],"in":[16,77,120],"network.":[18],"SDN":[19,36,78],"works":[20],"as":[21,55,177,234],"a":[22,184],"central":[23],"point":[24],"which":[26,243],"is":[28,33,41,81,231,241,244],"administered":[29],"centrally":[30],"and":[31,70,92,111,117,128,147,159,182,228,233,252],"traffic":[32,91,224],"also":[34,51],"managed.":[35],"being":[37],"open":[38],"source":[39],"product":[40],"more":[42,74,210],"prone":[43],"security":[45,48],"threats.":[46],"The":[47,66,220],"policies":[49],"are":[50,73],"be":[53,62,254],"enforced":[54],"it":[56],"would":[57],"otherwise":[58],"let":[59],"controller":[61],"attacked":[63],"most.":[65],"attacks":[67,72,215],"like":[68,141],"DDOS":[69,80,163,214],"DOS":[71],"commonly":[75],"found":[76],"controller.":[79],"destructive":[82],"attack":[83],"that":[84,172],"normally":[85],"diverts":[86],"normal":[88,227],"of":[90,97,114,195,212,222],"starts":[93],"over":[95],"flooded":[98],"packets":[99],"halting":[100],"system.":[102],"Machine":[103,158,197],"Learning":[104,198],"techniques":[105,130,199],"helps":[106,119],"identify":[108],"hidden":[110],"unexpected":[112],"pattern":[113],"network":[116,123],"hence":[118],"analyzing":[121],"flow.":[124],"All":[125],"classified":[127],"unclassified":[129],"can":[131],"help":[132],"detect":[133,162],"malicious":[135],"based":[137],"on":[138,204,216,257],"certain":[139],"parameters":[140],"packet":[142],"flow,":[143],"duration,":[145],"accuracy":[146,211],"precision":[148,181,218],"rate.":[149,219],"Researchers":[150],"have":[151],"used":[152],"Bayesian":[153],"Network,":[154],"Wavelets,":[155],"Support":[156],"Vector":[157],"KNN":[160,173,203,251],"attacks.":[164],"As":[165],"per":[166,178,235],"review":[168],"it's":[169],"been":[170],"analyzed":[171],"produces":[174,192],"better":[175,193,248],"result":[176,221,237],"higher":[180,217],"giving":[183,209,247],"lower":[185],"falser":[186],"rate":[187],"for":[188,246,258],"detection.":[189],"This":[190],"paper":[191],"approach":[194,249],"hybrid":[196],"rather":[200],"than":[201,250],"existing":[202],"same":[206],"set":[208],"detecting":[213],"with":[225],"both":[226],"abnormal":[229],"behavior":[230],"shown":[232],"proposed":[239],"algorithm":[240],"designed":[242],"suited":[245],"will":[253],"implemented":[255],"later":[256],"future.":[259]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
